A Protocol for Evaluating Video Trackers Under Real-World Conditions Abstract?The absence of a commonly adopted performance evaluation framework is hampering advances in the design of effective video trackers. < Final Year Projects > In this paper, we present a single-score evaluation measure and a protocol to objectively compare trackers. The proposed measure evaluates tracking accuracy…
A Proxy-Based Approach to Continuous Location-Based Spatial Queries in Mobile Environments Abstract? Caching valid regions of spatial queries at mobile clients is effective in reducing the number of queries submitted by mobile clients and query load on the server. However, mobile clients suffer from longer waiting time for the server to compute valid regions. We…
A Research of Feature-based Image Mosaic Algorithm Abstract?Due to the stitching precision and speed of existing image mosaicing technique, this paper summarizes three common based on Feature matching algorithm: Harris corner detection algorithm, SIFT (Scale Invariant Feature Transform) algorithm, SURF ( Speeded-Up Robust Features ) algorithm. This paper describes the principle of three algorithm respectively….
A Rough-Set-Based Incremental Approach for Updating Approximations under Dynamic Maintenance Environments Abstract?Approximations of a concept by a variable precision rough-set model (VPRS) usually vary under a dynamic information system environment. It is thus effective to carry out incremental updating approximations by utilizing previous data structures.< Final Year Project > This paper focuses on a new…
A Secret-Sharing-Based Method for Authentication of Grayscale Document Images via the Use of the PNG Image With a Data Repair Capability Abstract? A new blind authentication method based on the secret sharing technique with a data repair capability for grayscale document images via the use of the Portable Network Graphics (PNG) image is proposed. An…
A Secure and Privacy-Preserving Opportunistic Computing Framework for Mobile-Healthcare Emergency. With the pervasiveness of smart phones and the advance of wireless body sensor networks (BSNs), mobile Healthcare (m-Healthcare), which extends the operation of Healthcare provider into a pervasive environment for better health monitoring, has attracted considerable interest recently. However, the flourish of m-Healthcare still faces…
A Secure Payment Scheme with Low Communication and Processing Overhead for Multihop Wireless Networks Abstract? A Secure Payment Scheme with Low Communication and Processing Overhead for Multihop Wireless Networks. Video View Demo [numbers_sections number=”1″ title=”Including =Packages=” last=”no” ] Base Paper Complete Source Code Complete Documentation Complete Presentation Slides Flow Diagram Database File Screenshots Execution Procedure…
A Secure Protocol for Spontaneous Wireless Ad Hoc Networks Creation Abstract? A Secure Protocol for Spontaneous Wireless Ad Hoc Networks Creation.a secure protocol for spontaneous wireless ad hoc networks which uses an hybrid symmetric/asymmetric scheme and the trust between users in order to exchange the initial data and to exchange the secret keys that will…
A Secured Authentication System for MANETs using voice and Fingerprint Biometrics Abstract?Mobile Adhoc NETworks (MANET) are collections of wireless mobile devices with restricted broadcast range and resources and communication is achieved by relaying data along appropriate routes that are dynamically discovered and maintained through collaboration between the nodes. MANET is a self configuring, dynamic, multi…
A Security Modeling Approach forWeb-Service-based Business Processes. Several reports indicate that the highest business priorities include: business improvement, security, and IT management. The importance of security and risk management is gaining that even government statements in some cases have imposed the inclusion of security and risk management within business management. Risk assessment has become an…
A Segmentation and Graph-based Sequence Matching Method for Video Copy Detection Abstract? We propose in this paper a segmentation and graph-based video sequence matching method for video copy detection. Specifically, due to the good stability and discriminative ability of local features, we use SIFT descriptor for video content description. However, matching based on SIFT descriptor…